Advanced Computer Networks

Post on 30-Jan-2016

61 views 0 download

Tags:

description

Advanced Computer Networks. Lecture 4 Security. 1 Motivation. More vital/secret data handled by distributed components within network systems and Internet. Security : protecting data stored in and transferred between distributed components from unauthorised access. - PowerPoint PPT Presentation

Transcript of Advanced Computer Networks

Advanced Computer Networks

Lecture 4

Security

1 Motivation• More vital/secret data handled by distributed components

within network systems and Internet.• Security: protecting data stored in and transferred between

distributed components from unauthorised access.• Insecurity effect: Confidential Data may be stolen, e.g.:

– corporate plans.– new product designs.– medical/financial records (e.g. Access bills…)

• Insecurity effect: Data may be altered, e.g.:– finances made to seem better than they are.– results of tests, e.g. on drugs, altered.– examination results amended (up or down).

1 Why are Distributed Systems Insecure?

• Distributed component rely on messages sent and received from network.

• Is network (especially WANs and wireless networks) secure?

• Is client component secure?• Is client component who it claims to be?• Are users of calling components really who they

claim to be?

1 Consequences of Insecurity

• Loss of confidence: above effects may reduce confidence in computerized systems.

• Claims for damages: legal developments may allow someone to sue if data on computer has not been guarded according to best practice.

• Loss of privacy: data legally stored on a computer may well be private to the person concerned (e.g. medical/personnel) record.

2 Security Threats• Categorization of attacks (and goals of attacks) that

may be made on system.• Three broad classes:

– leakage: information leaving system.– tampering: unauthorised information altering.– vandalism: disturbing correct system operation.

• Used to specify what the system is proof, or secure, against.

• Attacks: Passive and Active

2 Passive Attacks• Eavesdropping on transmissions

– Receive message copies without authority.• To obtain information• Release of message contents

– Outsider learns content of transmission• Traffic analysis

– By monitoring frequency and length of messages, even encrypted, nature of communication may be guessed

• Difficult to detect• Can be prevented

2 Active Attacks Masquerading: Pretending to be a different entity

without authority. Message tampering: Intercepting and altering

messages. Replaying: Storing messages and sending them later. Denial of service: Flooding server resources with

messages in order to deny other’s access. Hard to prevent Easy to detect

– Detection may lead to deterrent

3.1 Introduction

• Cryptography: encode message data so that it can only be understood by intended recipient.

• Romans used it in military communication.• Given knowledge of encryption algorithm, a brute

force attempt is to try every possible decoding until a valid message is produced.

• Computers are good at this!• Modern schemes must be computationally hard to

solve to remain secure.

3.2 Cryptographic Terminology

• Plain text: the message before encoding (by encryption).

• Cipher text: the message after encoding.• Key: information needed to convert from plain

text to cipher text (or vice-versa).• Function: the encryption or decryption algorithm

used, in conjunction with key, to encode or decode message.

• Key distribution service: trusted service which hands out keys.

3.3 Encryption

• Encrypting data prevents unauthorised access to the data (i.e. prevents eavesdropping).

• If encrypted data can only be encrypted with a matching key, this can be used to prove sender’s identity (i.e. prevents masquerading).

• Likewise, it can be used to ensure that only intended recipients can use the data.

• Two main ways: secret key and public key..

3.4 Secret Keys

• One key is used to both encrypt and decrypt data• Encryption and decryption functions are often

chosen to be the same type• Security should not be compromised by making

function well-known as security comes from secret keys

3.4 Enigma Encryption Machine

3.4 Using Secret Keys

• Sender and recipient exchange keys through some secure, trusted, non-network based means.

• Sender encodes message using encryption function and sends the message, knowing that only the holder of key (the intended recipient) can make sense of it.

• Recipient decodes message, and knows that only intended sender could generate it.

• Message can be captured but is of no use.

3.4 Simplified Model of Symmetric (Secret Key) Encryption

3.4 Secret Key Encryption Algorithms

• Historical cipher– Caesar Cipher– Monoalphabetic Cipher– Polyalphabetic Cipher

3.4.1 Caesar Cipher Each letter in plaintext is substituted with letter that is K

letters later Wrap around is allowed (i.e., z followed by letter a) If K = 3, a in plaintext becomes d in cipher text

b in plaintext becomes e in cipher text

—Exercise: “Dolfh, L oryh brx. Ere”—Once it is known that Caesar cipher is being used, it is easy to break the code (only 25 possible key values).

3.4.1 Attacking Caesar Cipher: Brute-Force

• Brute-Force attack is based on the making sense feature of the data by trying every possible key.

• Suppose that the cipher “mrsxocoexsfobcsdi” is the result of a Caesar shift cipher.

• Since the key space is {0, 1, …, 25}, then the possible plaintexts are: mrsxocoexsfobcsdi, nstypdpfytgpcdtej, otuzqeqgzuhqdeufk, puvarfrhavirefvgl, qvwbsgsibwjsfgwhm, rwxcthtjcxktghxin, sxyduiukdyluhiyjo, tyzevjvlezmvijzkp, uzafwkwmfanwjkalq, vabgxlxngboxklbmr, wbchymyohcpylmcns, xcdiznzpidqzmndot, ydejaoaqjeranoepu, zefkbpbrkfsbopfqv, afglcqcslgtcpqgrw, bghmdrdtmhudqrhsx, chineseuniversity, dijoftfvojwfstjuz, ejkpgugwpkxgtukva, fklqhvhxqlyhuvlwb, glmriwiyrmzivwmxc, hmnsjxjzsnajwxnyd, inotkykatobkxyoze, jopulzlbupclyzpaf, kpqvmamcvqdmzaqbg, lqrwnbndwrenabrch

3.4.2 Monoalphabetic Cipher Improvement on Caesar Cipher Rather than substituting according to a regular pattern

– any letter can be substituted for any other letter, as long as each letter has a unique substitute letter, and vice versa.

Example of a monoalphabetic cipher Plain Text: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher Text: m n b v c x z a s d f g h j k l p o i u y t r e w q

Complexity: – _______ Possible pairings of letters – so breaking code is

not as easy as in the case of Caesar cipher.26!

3.4.2 Cryptanalysis: Simple Example

• Mono-alphabetic substitution ciphers can be broken by simple frequency analysis

• The relative frequency of letters in English text is distinct (shown in table)

• Ciphertext frequencies can be used to guess plaintext letters

Letter: a b c d e f g h i j k l m

Frequency: 7 1 3 4 13 3 2 3 8 <1 <1 4 3

Letter: n o p q r s t u v w x y z

Frequency: 8 7 3 <1 8 6 9 3 1 1 <1 2 <1

3.4.2 Cryptanalysis

• It is the art and science of breaking ciphers, ciphertexts, or keys.

• Brute-force: A cryptanalysis where all possible keys are tested, and then the result possible plaintext are analyzed.

• Statistical analysis: single-letter appearance frequency; “q” is mostly followed by “u”; multi-letter frequency.

• Known plaintext-ciphertext combination.

3.4.3 Polyalphabetic Encryption• Use multiple monoalphabetic/Caesar ciphers• Use a specific monoalphabetic/Caesar cipher to encode

a letter in a specific position in the plain text message• This implies that same letter appearing in different

positions in the plaintext might be encoded differently.

Example: 2 Caesar ciphers; K = 5, K = 19For every 5 bits in the plain text use the 2 Caesar ciphers

in the following pattern: C1, C2, C2, C1, C2

3.4.3 Example: Vigenere Cipher

• In the Vigenere cipher, the character in the ciphertext is chosen from a two-dimensional table (26 x 26), in which each row is a permutation of 26 characters (A to Z).